diff options
Diffstat (limited to 'busybox/networking/wget.c')
-rw-r--r-- | busybox/networking/wget.c | 868 |
1 files changed, 868 insertions, 0 deletions
diff --git a/busybox/networking/wget.c b/busybox/networking/wget.c new file mode 100644 index 000000000..45acef4d6 --- /dev/null +++ b/busybox/networking/wget.c | |||
@@ -0,0 +1,868 @@ | |||
1 | /* vi: set sw=4 ts=4: */ | ||
2 | /* | ||
3 | * wget - retrieve a file using HTTP or FTP | ||
4 | * | ||
5 | * Chip Rosenthal Covad Communications <chip@laserlink.net> | ||
6 | * | ||
7 | */ | ||
8 | |||
9 | #include <stdio.h> | ||
10 | #include <errno.h> | ||
11 | #include <stdlib.h> | ||
12 | #include <unistd.h> | ||
13 | #include <ctype.h> | ||
14 | #include <string.h> | ||
15 | #include <unistd.h> | ||
16 | #include <signal.h> | ||
17 | #include <sys/ioctl.h> | ||
18 | |||
19 | #include <sys/time.h> | ||
20 | #include <sys/types.h> | ||
21 | #include <sys/stat.h> | ||
22 | #include <sys/socket.h> | ||
23 | #include <netinet/in.h> | ||
24 | #include <arpa/inet.h> | ||
25 | #include <netdb.h> | ||
26 | |||
27 | #ifndef _GNU_SOURCE | ||
28 | #define _GNU_SOURCE | ||
29 | #endif | ||
30 | #include <getopt.h> | ||
31 | |||
32 | #include "busybox.h" | ||
33 | |||
34 | struct host_info { | ||
35 | char *host; | ||
36 | int port; | ||
37 | char *path; | ||
38 | int is_ftp; | ||
39 | char *user; | ||
40 | }; | ||
41 | |||
42 | static void parse_url(char *url, struct host_info *h); | ||
43 | static FILE *open_socket(struct sockaddr_in *s_in); | ||
44 | static char *gethdr(char *buf, size_t bufsiz, FILE *fp, int *istrunc); | ||
45 | static int ftpcmd(char *s1, char *s2, FILE *fp, char *buf); | ||
46 | |||
47 | /* Globals (can be accessed from signal handlers */ | ||
48 | static off_t filesize = 0; /* content-length of the file */ | ||
49 | static int chunked = 0; /* chunked transfer encoding */ | ||
50 | #ifdef CONFIG_FEATURE_WGET_STATUSBAR | ||
51 | static void progressmeter(int flag); | ||
52 | static char *curfile; /* Name of current file being transferred. */ | ||
53 | static struct timeval start; /* Time a transfer started. */ | ||
54 | static volatile unsigned long statbytes = 0; /* Number of bytes transferred so far. */ | ||
55 | /* For progressmeter() -- number of seconds before xfer considered "stalled" */ | ||
56 | static const int STALLTIME = 5; | ||
57 | #endif | ||
58 | |||
59 | static void close_and_delete_outfile(FILE* output, char *fname_out, int do_continue) | ||
60 | { | ||
61 | if (output != stdout && do_continue==0) { | ||
62 | fclose(output); | ||
63 | unlink(fname_out); | ||
64 | } | ||
65 | } | ||
66 | |||
67 | /* Read NMEMB elements of SIZE bytes into PTR from STREAM. Returns the | ||
68 | * number of elements read, and a short count if an eof or non-interrupt | ||
69 | * error is encountered. */ | ||
70 | static size_t safe_fread(void *ptr, size_t size, size_t nmemb, FILE *stream) | ||
71 | { | ||
72 | size_t ret = 0; | ||
73 | |||
74 | do { | ||
75 | clearerr(stream); | ||
76 | ret += fread((char *)ptr + (ret * size), size, nmemb - ret, stream); | ||
77 | } while (ret < nmemb && ferror(stream) && errno == EINTR); | ||
78 | |||
79 | return ret; | ||
80 | } | ||
81 | |||
82 | /* Write NMEMB elements of SIZE bytes from PTR to STREAM. Returns the | ||
83 | * number of elements written, and a short count if an eof or non-interrupt | ||
84 | * error is encountered. */ | ||
85 | static size_t safe_fwrite(void *ptr, size_t size, size_t nmemb, FILE *stream) | ||
86 | { | ||
87 | size_t ret = 0; | ||
88 | |||
89 | do { | ||
90 | clearerr(stream); | ||
91 | ret += fwrite((char *)ptr + (ret * size), size, nmemb - ret, stream); | ||
92 | } while (ret < nmemb && ferror(stream) && errno == EINTR); | ||
93 | |||
94 | return ret; | ||
95 | } | ||
96 | |||
97 | /* Read a line or SIZE - 1 bytes into S, whichever is less, from STREAM. | ||
98 | * Returns S, or NULL if an eof or non-interrupt error is encountered. */ | ||
99 | static char *safe_fgets(char *s, int size, FILE *stream) | ||
100 | { | ||
101 | char *ret; | ||
102 | |||
103 | do { | ||
104 | clearerr(stream); | ||
105 | ret = fgets(s, size, stream); | ||
106 | } while (ret == NULL && ferror(stream) && errno == EINTR); | ||
107 | |||
108 | return ret; | ||
109 | } | ||
110 | |||
111 | #define close_delete_and_die(s...) { \ | ||
112 | close_and_delete_outfile(output, fname_out, do_continue); \ | ||
113 | bb_error_msg_and_die(s); } | ||
114 | |||
115 | |||
116 | #ifdef CONFIG_FEATURE_WGET_AUTHENTICATION | ||
117 | /* | ||
118 | * Base64-encode character string | ||
119 | * oops... isn't something similar in uuencode.c? | ||
120 | * It would be better to use already existing code | ||
121 | */ | ||
122 | char *base64enc(unsigned char *p, char *buf, int len) { | ||
123 | |||
124 | char al[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" | ||
125 | "0123456789+/"; | ||
126 | char *s = buf; | ||
127 | |||
128 | while(*p) { | ||
129 | if (s >= buf+len-4) | ||
130 | bb_error_msg_and_die("buffer overflow"); | ||
131 | *(s++) = al[(*p >> 2) & 0x3F]; | ||
132 | *(s++) = al[((*p << 4) & 0x30) | ((*(p+1) >> 4) & 0x0F)]; | ||
133 | *s = *(s+1) = '='; | ||
134 | *(s+2) = 0; | ||
135 | if (! *(++p)) break; | ||
136 | *(s++) = al[((*p << 2) & 0x3C) | ((*(p+1) >> 6) & 0x03)]; | ||
137 | if (! *(++p)) break; | ||
138 | *(s++) = al[*(p++) & 0x3F]; | ||
139 | } | ||
140 | |||
141 | return buf; | ||
142 | } | ||
143 | #endif | ||
144 | |||
145 | #define WGET_OPT_CONTINUE 1 | ||
146 | #define WGET_OPT_QUIET 2 | ||
147 | #define WGET_OPT_PASSIVE 4 | ||
148 | #define WGET_OPT_OUTNAME 8 | ||
149 | #define WGET_OPT_HEADER 16 | ||
150 | #define WGET_OPT_PREFIX 32 | ||
151 | #define WGET_OPT_PROXY 64 | ||
152 | |||
153 | static const struct option wget_long_options[] = { | ||
154 | { "continue", 0, NULL, 'c' }, | ||
155 | { "quiet", 0, NULL, 'q' }, | ||
156 | { "passive-ftp", 0, NULL, 139 }, | ||
157 | { "output-document", 1, NULL, 'O' }, | ||
158 | { "header", 1, NULL, 131 }, | ||
159 | { "directory-prefix",1, NULL, 'P' }, | ||
160 | { "proxy", 1, NULL, 'Y' }, | ||
161 | { 0, 0, 0, 0 } | ||
162 | }; | ||
163 | |||
164 | int wget_main(int argc, char **argv) | ||
165 | { | ||
166 | int n, try=5, status; | ||
167 | unsigned long opt; | ||
168 | int port; | ||
169 | char *proxy = 0; | ||
170 | char *dir_prefix=NULL; | ||
171 | char *s, buf[512]; | ||
172 | struct stat sbuf; | ||
173 | char extra_headers[1024]; | ||
174 | char *extra_headers_ptr = extra_headers; | ||
175 | int extra_headers_left = sizeof(extra_headers); | ||
176 | struct host_info server, target; | ||
177 | struct sockaddr_in s_in; | ||
178 | llist_t *headers_llist = NULL; | ||
179 | |||
180 | FILE *sfp = NULL; /* socket to web/ftp server */ | ||
181 | FILE *dfp = NULL; /* socket to ftp server (data) */ | ||
182 | char *fname_out = NULL; /* where to direct output (-O) */ | ||
183 | int do_continue = 0; /* continue a prev transfer (-c) */ | ||
184 | long beg_range = 0L; /* range at which continue begins */ | ||
185 | int got_clen = 0; /* got content-length: from server */ | ||
186 | FILE *output; /* socket to web server */ | ||
187 | int quiet_flag = FALSE; /* Be verry, verry quiet... */ | ||
188 | int use_proxy = 1; /* Use proxies if env vars are set */ | ||
189 | char *proxy_flag = "on"; /* Use proxies if env vars are set */ | ||
190 | |||
191 | /* | ||
192 | * Crack command line. | ||
193 | */ | ||
194 | bb_opt_complementaly = "\203*"; | ||
195 | bb_applet_long_options = wget_long_options; | ||
196 | opt = bb_getopt_ulflags(argc, argv, "cq\213O:\203:P:Y:", &fname_out, &headers_llist, &dir_prefix, &proxy_flag); | ||
197 | if (opt & WGET_OPT_CONTINUE) { | ||
198 | ++do_continue; | ||
199 | } | ||
200 | if (opt & WGET_OPT_QUIET) { | ||
201 | quiet_flag = TRUE; | ||
202 | } | ||
203 | if (strcmp(proxy_flag, "off") == 0) { | ||
204 | /* Use the proxy if necessary. */ | ||
205 | use_proxy = 0; | ||
206 | } | ||
207 | if (opt & WGET_OPT_HEADER) { | ||
208 | while (headers_llist) { | ||
209 | int arglen = strlen(headers_llist->data); | ||
210 | if (extra_headers_left - arglen - 2 <= 0) | ||
211 | bb_error_msg_and_die("extra_headers buffer too small(need %i)", extra_headers_left - arglen); | ||
212 | strcpy(extra_headers_ptr, headers_llist->data); | ||
213 | extra_headers_ptr += arglen; | ||
214 | extra_headers_left -= ( arglen + 2 ); | ||
215 | *extra_headers_ptr++ = '\r'; | ||
216 | *extra_headers_ptr++ = '\n'; | ||
217 | *(extra_headers_ptr + 1) = 0; | ||
218 | headers_llist = headers_llist->link; | ||
219 | } | ||
220 | } | ||
221 | if (argc - optind != 1) | ||
222 | bb_show_usage(); | ||
223 | |||
224 | parse_url(argv[optind], &target); | ||
225 | server.host = target.host; | ||
226 | server.port = target.port; | ||
227 | |||
228 | /* | ||
229 | * Use the proxy if necessary. | ||
230 | */ | ||
231 | if (use_proxy) { | ||
232 | proxy = getenv(target.is_ftp ? "ftp_proxy" : "http_proxy"); | ||
233 | if (proxy && *proxy) { | ||
234 | parse_url(bb_xstrdup(proxy), &server); | ||
235 | } else { | ||
236 | use_proxy = 0; | ||
237 | } | ||
238 | } | ||
239 | |||
240 | /* Guess an output filename */ | ||
241 | if (!fname_out) { | ||
242 | // Dirty hack. Needed because bb_get_last_path_component | ||
243 | // will destroy trailing / by storing '\0' in last byte! | ||
244 | if(target.path[strlen(target.path)-1]!='/') { | ||
245 | fname_out = | ||
246 | #ifdef CONFIG_FEATURE_WGET_STATUSBAR | ||
247 | curfile = | ||
248 | #endif | ||
249 | bb_get_last_path_component(target.path); | ||
250 | } | ||
251 | if (fname_out==NULL || strlen(fname_out)<1) { | ||
252 | fname_out = | ||
253 | #ifdef CONFIG_FEATURE_WGET_STATUSBAR | ||
254 | curfile = | ||
255 | #endif | ||
256 | "index.html"; | ||
257 | } | ||
258 | if (dir_prefix != NULL) | ||
259 | fname_out = concat_path_file(dir_prefix, fname_out); | ||
260 | #ifdef CONFIG_FEATURE_WGET_STATUSBAR | ||
261 | } else { | ||
262 | curfile = bb_get_last_path_component(fname_out); | ||
263 | #endif | ||
264 | } | ||
265 | if (do_continue && !fname_out) | ||
266 | bb_error_msg_and_die("cannot specify continue (-c) without a filename (-O)"); | ||
267 | |||
268 | |||
269 | /* | ||
270 | * Open the output file stream. | ||
271 | */ | ||
272 | if (strcmp(fname_out, "-") == 0) { | ||
273 | output = stdout; | ||
274 | quiet_flag = TRUE; | ||
275 | } else { | ||
276 | output = bb_xfopen(fname_out, (do_continue ? "a" : "w")); | ||
277 | } | ||
278 | |||
279 | /* | ||
280 | * Determine where to start transfer. | ||
281 | */ | ||
282 | if (do_continue) { | ||
283 | if (fstat(fileno(output), &sbuf) < 0) | ||
284 | bb_perror_msg_and_die("fstat()"); | ||
285 | if (sbuf.st_size > 0) | ||
286 | beg_range = sbuf.st_size; | ||
287 | else | ||
288 | do_continue = 0; | ||
289 | } | ||
290 | |||
291 | /* We want to do exactly _one_ DNS lookup, since some | ||
292 | * sites (i.e. ftp.us.debian.org) use round-robin DNS | ||
293 | * and we want to connect to only one IP... */ | ||
294 | bb_lookup_host(&s_in, server.host); | ||
295 | s_in.sin_port = server.port; | ||
296 | if (quiet_flag==FALSE) { | ||
297 | fprintf(stdout, "Connecting to %s[%s]:%d\n", | ||
298 | server.host, inet_ntoa(s_in.sin_addr), ntohs(server.port)); | ||
299 | } | ||
300 | |||
301 | if (use_proxy || !target.is_ftp) { | ||
302 | /* | ||
303 | * HTTP session | ||
304 | */ | ||
305 | do { | ||
306 | got_clen = chunked = 0; | ||
307 | |||
308 | if (! --try) | ||
309 | close_delete_and_die("too many redirections"); | ||
310 | |||
311 | /* | ||
312 | * Open socket to http server | ||
313 | */ | ||
314 | if (sfp) fclose(sfp); | ||
315 | sfp = open_socket(&s_in); | ||
316 | |||
317 | /* | ||
318 | * Send HTTP request. | ||
319 | */ | ||
320 | if (use_proxy) { | ||
321 | const char *format = "GET %stp://%s:%d/%s HTTP/1.1\r\n"; | ||
322 | #ifdef CONFIG_FEATURE_WGET_IP6_LITERAL | ||
323 | if (strchr (target.host, ':')) | ||
324 | format = "GET %stp://[%s]:%d/%s HTTP/1.1\r\n"; | ||
325 | #endif | ||
326 | fprintf(sfp, format, | ||
327 | target.is_ftp ? "f" : "ht", target.host, | ||
328 | ntohs(target.port), target.path); | ||
329 | } else { | ||
330 | fprintf(sfp, "GET /%s HTTP/1.1\r\n", target.path); | ||
331 | } | ||
332 | |||
333 | fprintf(sfp, "Host: %s\r\nUser-Agent: Wget\r\n", target.host); | ||
334 | |||
335 | #ifdef CONFIG_FEATURE_WGET_AUTHENTICATION | ||
336 | if (target.user) { | ||
337 | fprintf(sfp, "Authorization: Basic %s\r\n", | ||
338 | base64enc(target.user, buf, sizeof(buf))); | ||
339 | } | ||
340 | if (use_proxy && server.user) { | ||
341 | fprintf(sfp, "Proxy-Authorization: Basic %s\r\n", | ||
342 | base64enc(server.user, buf, sizeof(buf))); | ||
343 | } | ||
344 | #endif | ||
345 | |||
346 | if (do_continue) | ||
347 | fprintf(sfp, "Range: bytes=%ld-\r\n", beg_range); | ||
348 | if(extra_headers_left < sizeof(extra_headers)) | ||
349 | fputs(extra_headers,sfp); | ||
350 | fprintf(sfp,"Connection: close\r\n\r\n"); | ||
351 | |||
352 | /* | ||
353 | * Retrieve HTTP response line and check for "200" status code. | ||
354 | */ | ||
355 | read_response: | ||
356 | if (fgets(buf, sizeof(buf), sfp) == NULL) | ||
357 | close_delete_and_die("no response from server"); | ||
358 | |||
359 | for (s = buf ; *s != '\0' && !isspace(*s) ; ++s) | ||
360 | ; | ||
361 | for ( ; isspace(*s) ; ++s) | ||
362 | ; | ||
363 | switch (status = atoi(s)) { | ||
364 | case 0: | ||
365 | case 100: | ||
366 | while (gethdr(buf, sizeof(buf), sfp, &n) != NULL); | ||
367 | goto read_response; | ||
368 | case 200: | ||
369 | if (do_continue && output != stdout) | ||
370 | output = freopen(fname_out, "w", output); | ||
371 | do_continue = 0; | ||
372 | break; | ||
373 | case 300: /* redirection */ | ||
374 | case 301: | ||
375 | case 302: | ||
376 | case 303: | ||
377 | break; | ||
378 | case 206: | ||
379 | if (do_continue) | ||
380 | break; | ||
381 | /*FALLTHRU*/ | ||
382 | default: | ||
383 | chomp(buf); | ||
384 | close_delete_and_die("server returned error %d: %s", atoi(s), buf); | ||
385 | } | ||
386 | |||
387 | /* | ||
388 | * Retrieve HTTP headers. | ||
389 | */ | ||
390 | while ((s = gethdr(buf, sizeof(buf), sfp, &n)) != NULL) { | ||
391 | if (strcasecmp(buf, "content-length") == 0) { | ||
392 | unsigned long value; | ||
393 | if (safe_strtoul(s, &value)) { | ||
394 | close_delete_and_die("content-length %s is garbage", s); | ||
395 | } | ||
396 | filesize = value; | ||
397 | got_clen = 1; | ||
398 | continue; | ||
399 | } | ||
400 | if (strcasecmp(buf, "transfer-encoding") == 0) { | ||
401 | if (strcasecmp(s, "chunked") == 0) { | ||
402 | chunked = got_clen = 1; | ||
403 | } else { | ||
404 | close_delete_and_die("server wants to do %s transfer encoding", s); | ||
405 | } | ||
406 | } | ||
407 | if (strcasecmp(buf, "location") == 0) { | ||
408 | if (s[0] == '/') | ||
409 | target.path = bb_xstrdup(s+1); | ||
410 | else { | ||
411 | parse_url(bb_xstrdup(s), &target); | ||
412 | if (use_proxy == 0) { | ||
413 | server.host = target.host; | ||
414 | server.port = target.port; | ||
415 | } | ||
416 | bb_lookup_host(&s_in, server.host); | ||
417 | s_in.sin_port = server.port; | ||
418 | break; | ||
419 | } | ||
420 | } | ||
421 | } | ||
422 | } while(status >= 300); | ||
423 | |||
424 | dfp = sfp; | ||
425 | } | ||
426 | else | ||
427 | { | ||
428 | /* | ||
429 | * FTP session | ||
430 | */ | ||
431 | if (! target.user) | ||
432 | target.user = bb_xstrdup("anonymous:busybox@"); | ||
433 | |||
434 | sfp = open_socket(&s_in); | ||
435 | if (ftpcmd(NULL, NULL, sfp, buf) != 220) | ||
436 | close_delete_and_die("%s", buf+4); | ||
437 | |||
438 | /* | ||
439 | * Splitting username:password pair, | ||
440 | * trying to log in | ||
441 | */ | ||
442 | s = strchr(target.user, ':'); | ||
443 | if (s) | ||
444 | *(s++) = '\0'; | ||
445 | switch(ftpcmd("USER ", target.user, sfp, buf)) { | ||
446 | case 230: | ||
447 | break; | ||
448 | case 331: | ||
449 | if (ftpcmd("PASS ", s, sfp, buf) == 230) | ||
450 | break; | ||
451 | /* FALLTHRU (failed login) */ | ||
452 | default: | ||
453 | close_delete_and_die("ftp login: %s", buf+4); | ||
454 | } | ||
455 | |||
456 | ftpcmd("CDUP", NULL, sfp, buf); | ||
457 | ftpcmd("TYPE I", NULL, sfp, buf); | ||
458 | |||
459 | /* | ||
460 | * Querying file size | ||
461 | */ | ||
462 | if (ftpcmd("SIZE /", target.path, sfp, buf) == 213) { | ||
463 | unsigned long value; | ||
464 | if (safe_strtoul(buf+4, &value)) { | ||
465 | close_delete_and_die("SIZE value is garbage"); | ||
466 | } | ||
467 | filesize = value; | ||
468 | got_clen = 1; | ||
469 | } | ||
470 | |||
471 | /* | ||
472 | * Entering passive mode | ||
473 | */ | ||
474 | if (ftpcmd("PASV", NULL, sfp, buf) != 227) | ||
475 | close_delete_and_die("PASV: %s", buf+4); | ||
476 | s = strrchr(buf, ','); | ||
477 | *s = 0; | ||
478 | port = atoi(s+1); | ||
479 | s = strrchr(buf, ','); | ||
480 | port += atoi(s+1) * 256; | ||
481 | s_in.sin_port = htons(port); | ||
482 | dfp = open_socket(&s_in); | ||
483 | |||
484 | if (do_continue) { | ||
485 | sprintf(buf, "REST %ld", beg_range); | ||
486 | if (ftpcmd(buf, NULL, sfp, buf) != 350) { | ||
487 | if (output != stdout) | ||
488 | output = freopen(fname_out, "w", output); | ||
489 | do_continue = 0; | ||
490 | } else | ||
491 | filesize -= beg_range; | ||
492 | } | ||
493 | |||
494 | if (ftpcmd("RETR /", target.path, sfp, buf) > 150) | ||
495 | close_delete_and_die("RETR: %s", buf+4); | ||
496 | |||
497 | } | ||
498 | |||
499 | |||
500 | /* | ||
501 | * Retrieve file | ||
502 | */ | ||
503 | if (chunked) { | ||
504 | fgets(buf, sizeof(buf), dfp); | ||
505 | filesize = strtol(buf, (char **) NULL, 16); | ||
506 | } | ||
507 | #ifdef CONFIG_FEATURE_WGET_STATUSBAR | ||
508 | if (quiet_flag==FALSE) | ||
509 | progressmeter(-1); | ||
510 | #endif | ||
511 | do { | ||
512 | while ((filesize > 0 || !got_clen) && (n = safe_fread(buf, 1, ((chunked || got_clen) && (filesize < sizeof(buf)) ? filesize : sizeof(buf)), dfp)) > 0) { | ||
513 | if (safe_fwrite(buf, 1, n, output) != n) { | ||
514 | bb_perror_msg_and_die("write error"); | ||
515 | } | ||
516 | #ifdef CONFIG_FEATURE_WGET_STATUSBAR | ||
517 | statbytes+=n; | ||
518 | #endif | ||
519 | if (got_clen) { | ||
520 | filesize -= n; | ||
521 | } | ||
522 | } | ||
523 | |||
524 | if (chunked) { | ||
525 | safe_fgets(buf, sizeof(buf), dfp); /* This is a newline */ | ||
526 | safe_fgets(buf, sizeof(buf), dfp); | ||
527 | filesize = strtol(buf, (char **) NULL, 16); | ||
528 | if (filesize==0) { | ||
529 | chunked = 0; /* all done! */ | ||
530 | } | ||
531 | } | ||
532 | |||
533 | if (n == 0 && ferror(dfp)) { | ||
534 | bb_perror_msg_and_die("network read error"); | ||
535 | } | ||
536 | } while (chunked); | ||
537 | #ifdef CONFIG_FEATURE_WGET_STATUSBAR | ||
538 | if (quiet_flag==FALSE) | ||
539 | progressmeter(1); | ||
540 | #endif | ||
541 | if ((use_proxy == 0) && target.is_ftp) { | ||
542 | fclose(dfp); | ||
543 | if (ftpcmd(NULL, NULL, sfp, buf) != 226) | ||
544 | bb_error_msg_and_die("ftp error: %s", buf+4); | ||
545 | ftpcmd("QUIT", NULL, sfp, buf); | ||
546 | } | ||
547 | exit(EXIT_SUCCESS); | ||
548 | } | ||
549 | |||
550 | |||
551 | void parse_url(char *url, struct host_info *h) | ||
552 | { | ||
553 | char *cp, *sp, *up, *pp; | ||
554 | |||
555 | if (strncmp(url, "http://", 7) == 0) { | ||
556 | h->port = bb_lookup_port("http", "tcp", 80); | ||
557 | h->host = url + 7; | ||
558 | h->is_ftp = 0; | ||
559 | } else if (strncmp(url, "ftp://", 6) == 0) { | ||
560 | h->port = bb_lookup_port("ftp", "tfp", 21); | ||
561 | h->host = url + 6; | ||
562 | h->is_ftp = 1; | ||
563 | } else | ||
564 | bb_error_msg_and_die("not an http or ftp url: %s", url); | ||
565 | |||
566 | sp = strchr(h->host, '/'); | ||
567 | if (sp) { | ||
568 | *sp++ = '\0'; | ||
569 | h->path = sp; | ||
570 | } else | ||
571 | h->path = bb_xstrdup(""); | ||
572 | |||
573 | up = strrchr(h->host, '@'); | ||
574 | if (up != NULL) { | ||
575 | h->user = h->host; | ||
576 | *up++ = '\0'; | ||
577 | h->host = up; | ||
578 | } else | ||
579 | h->user = NULL; | ||
580 | |||
581 | pp = h->host; | ||
582 | |||
583 | #ifdef CONFIG_FEATURE_WGET_IP6_LITERAL | ||
584 | if (h->host[0] == '[') { | ||
585 | char *ep; | ||
586 | |||
587 | ep = h->host + 1; | ||
588 | while (*ep == ':' || isxdigit (*ep)) | ||
589 | ep++; | ||
590 | if (*ep == ']') { | ||
591 | h->host++; | ||
592 | *ep = '\0'; | ||
593 | pp = ep + 1; | ||
594 | } | ||
595 | } | ||
596 | #endif | ||
597 | |||
598 | cp = strchr(pp, ':'); | ||
599 | if (cp != NULL) { | ||
600 | *cp++ = '\0'; | ||
601 | h->port = htons(atoi(cp)); | ||
602 | } | ||
603 | } | ||
604 | |||
605 | |||
606 | FILE *open_socket(struct sockaddr_in *s_in) | ||
607 | { | ||
608 | FILE *fp; | ||
609 | |||
610 | fp = fdopen(xconnect(s_in), "r+"); | ||
611 | if (fp == NULL) | ||
612 | bb_perror_msg_and_die("fdopen()"); | ||
613 | |||
614 | return fp; | ||
615 | } | ||
616 | |||
617 | |||
618 | char *gethdr(char *buf, size_t bufsiz, FILE *fp, int *istrunc) | ||
619 | { | ||
620 | char *s, *hdrval; | ||
621 | int c; | ||
622 | |||
623 | *istrunc = 0; | ||
624 | |||
625 | /* retrieve header line */ | ||
626 | if (fgets(buf, bufsiz, fp) == NULL) | ||
627 | return NULL; | ||
628 | |||
629 | /* see if we are at the end of the headers */ | ||
630 | for (s = buf ; *s == '\r' ; ++s) | ||
631 | ; | ||
632 | if (s[0] == '\n') | ||
633 | return NULL; | ||
634 | |||
635 | /* convert the header name to lower case */ | ||
636 | for (s = buf ; isalnum(*s) || *s == '-' ; ++s) | ||
637 | *s = tolower(*s); | ||
638 | |||
639 | /* verify we are at the end of the header name */ | ||
640 | if (*s != ':') | ||
641 | bb_error_msg_and_die("bad header line: %s", buf); | ||
642 | |||
643 | /* locate the start of the header value */ | ||
644 | for (*s++ = '\0' ; *s == ' ' || *s == '\t' ; ++s) | ||
645 | ; | ||
646 | hdrval = s; | ||
647 | |||
648 | /* locate the end of header */ | ||
649 | while (*s != '\0' && *s != '\r' && *s != '\n') | ||
650 | ++s; | ||
651 | |||
652 | /* end of header found */ | ||
653 | if (*s != '\0') { | ||
654 | *s = '\0'; | ||
655 | return hdrval; | ||
656 | } | ||
657 | |||
658 | /* Rats! The buffer isn't big enough to hold the entire header value. */ | ||
659 | while (c = getc(fp), c != EOF && c != '\n') | ||
660 | ; | ||
661 | *istrunc = 1; | ||
662 | return hdrval; | ||
663 | } | ||
664 | |||
665 | static int ftpcmd(char *s1, char *s2, FILE *fp, char *buf) | ||
666 | { | ||
667 | if (s1) { | ||
668 | if (!s2) s2=""; | ||
669 | fprintf(fp, "%s%s\r\n", s1, s2); | ||
670 | fflush(fp); | ||
671 | } | ||
672 | |||
673 | do { | ||
674 | char *buf_ptr; | ||
675 | |||
676 | if (fgets(buf, 510, fp) == NULL) { | ||
677 | bb_perror_msg_and_die("fgets()"); | ||
678 | } | ||
679 | buf_ptr = strstr(buf, "\r\n"); | ||
680 | if (buf_ptr) { | ||
681 | *buf_ptr = '\0'; | ||
682 | } | ||
683 | } while (! isdigit(buf[0]) || buf[3] != ' '); | ||
684 | |||
685 | return atoi(buf); | ||
686 | } | ||
687 | |||
688 | #ifdef CONFIG_FEATURE_WGET_STATUSBAR | ||
689 | /* Stuff below is from BSD rcp util.c, as added to openshh. | ||
690 | * Original copyright notice is retained at the end of this file. | ||
691 | * | ||
692 | */ | ||
693 | |||
694 | |||
695 | static int | ||
696 | getttywidth(void) | ||
697 | { | ||
698 | int width=0; | ||
699 | get_terminal_width_height(0, &width, NULL); | ||
700 | return (width); | ||
701 | } | ||
702 | |||
703 | static void | ||
704 | updateprogressmeter(int ignore) | ||
705 | { | ||
706 | int save_errno = errno; | ||
707 | |||
708 | progressmeter(0); | ||
709 | errno = save_errno; | ||
710 | } | ||
711 | |||
712 | static void | ||
713 | alarmtimer(int wait) | ||
714 | { | ||
715 | struct itimerval itv; | ||
716 | |||
717 | itv.it_value.tv_sec = wait; | ||
718 | itv.it_value.tv_usec = 0; | ||
719 | itv.it_interval = itv.it_value; | ||
720 | setitimer(ITIMER_REAL, &itv, NULL); | ||
721 | } | ||
722 | |||
723 | |||
724 | static void | ||
725 | progressmeter(int flag) | ||
726 | { | ||
727 | static const char prefixes[] = " KMGTP"; | ||
728 | static struct timeval lastupdate; | ||
729 | static off_t lastsize, totalsize; | ||
730 | struct timeval now, td, wait; | ||
731 | off_t cursize, abbrevsize; | ||
732 | double elapsed; | ||
733 | int ratio, barlength, i, remaining; | ||
734 | char buf[256]; | ||
735 | |||
736 | if (flag == -1) { | ||
737 | (void) gettimeofday(&start, (struct timezone *) 0); | ||
738 | lastupdate = start; | ||
739 | lastsize = 0; | ||
740 | totalsize = filesize; /* as filesize changes.. */ | ||
741 | } | ||
742 | |||
743 | (void) gettimeofday(&now, (struct timezone *) 0); | ||
744 | cursize = statbytes; | ||
745 | if (totalsize != 0 && !chunked) { | ||
746 | ratio = 100.0 * cursize / totalsize; | ||
747 | ratio = MAX(ratio, 0); | ||
748 | ratio = MIN(ratio, 100); | ||
749 | } else | ||
750 | ratio = 100; | ||
751 | |||
752 | snprintf(buf, sizeof(buf), "\r%-20.20s %3d%% ", curfile, ratio); | ||
753 | |||
754 | barlength = getttywidth() - 51; | ||
755 | if (barlength > 0) { | ||
756 | i = barlength * ratio / 100; | ||
757 | snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), | ||
758 | "|%.*s%*s|", i, | ||
759 | "*****************************************************************************" | ||
760 | "*****************************************************************************", | ||
761 | barlength - i, ""); | ||
762 | } | ||
763 | i = 0; | ||
764 | abbrevsize = cursize; | ||
765 | while (abbrevsize >= 100000 && i < sizeof(prefixes)) { | ||
766 | i++; | ||
767 | abbrevsize >>= 10; | ||
768 | } | ||
769 | snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), " %5d %c%c ", | ||
770 | (int) abbrevsize, prefixes[i], prefixes[i] == ' ' ? ' ' : | ||
771 | 'B'); | ||
772 | |||
773 | timersub(&now, &lastupdate, &wait); | ||
774 | if (cursize > lastsize) { | ||
775 | lastupdate = now; | ||
776 | lastsize = cursize; | ||
777 | if (wait.tv_sec >= STALLTIME) { | ||
778 | start.tv_sec += wait.tv_sec; | ||
779 | start.tv_usec += wait.tv_usec; | ||
780 | } | ||
781 | wait.tv_sec = 0; | ||
782 | } | ||
783 | timersub(&now, &start, &td); | ||
784 | elapsed = td.tv_sec + (td.tv_usec / 1000000.0); | ||
785 | |||
786 | if (wait.tv_sec >= STALLTIME) { | ||
787 | snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), | ||
788 | " - stalled -"); | ||
789 | } else if (statbytes <= 0 || elapsed <= 0.0 || cursize > totalsize || chunked) { | ||
790 | snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), | ||
791 | " --:-- ETA"); | ||
792 | } else { | ||
793 | remaining = (int) (totalsize / (statbytes / elapsed) - elapsed); | ||
794 | i = remaining / 3600; | ||
795 | if (i) | ||
796 | snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), | ||
797 | "%2d:", i); | ||
798 | else | ||
799 | snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), | ||
800 | " "); | ||
801 | i = remaining % 3600; | ||
802 | snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), | ||
803 | "%02d:%02d ETA", i / 60, i % 60); | ||
804 | } | ||
805 | write(STDERR_FILENO, buf, strlen(buf)); | ||
806 | |||
807 | if (flag == -1) { | ||
808 | struct sigaction sa; | ||
809 | sa.sa_handler = updateprogressmeter; | ||
810 | sigemptyset(&sa.sa_mask); | ||
811 | sa.sa_flags = SA_RESTART; | ||
812 | sigaction(SIGALRM, &sa, NULL); | ||
813 | alarmtimer(1); | ||
814 | } else if (flag == 1) { | ||
815 | alarmtimer(0); | ||
816 | statbytes = 0; | ||
817 | putc('\n', stderr); | ||
818 | } | ||
819 | } | ||
820 | #endif | ||
821 | |||
822 | /* Original copyright notice which applies to the CONFIG_FEATURE_WGET_STATUSBAR stuff, | ||
823 | * much of which was blatantly stolen from openssh. */ | ||
824 | |||
825 | /*- | ||
826 | * Copyright (c) 1992, 1993 | ||
827 | * The Regents of the University of California. All rights reserved. | ||
828 | * | ||
829 | * Redistribution and use in source and binary forms, with or without | ||
830 | * modification, are permitted provided that the following conditions | ||
831 | * are met: | ||
832 | * 1. Redistributions of source code must retain the above copyright | ||
833 | * notice, this list of conditions and the following disclaimer. | ||
834 | * 2. Redistributions in binary form must reproduce the above copyright | ||
835 | * notice, this list of conditions and the following disclaimer in the | ||
836 | * documentation and/or other materials provided with the distribution. | ||
837 | * | ||
838 | * 3. <BSD Advertising Clause omitted per the July 22, 1999 licensing change | ||
839 | * ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change> | ||
840 | * | ||
841 | * 4. Neither the name of the University nor the names of its contributors | ||
842 | * may be used to endorse or promote products derived from this software | ||
843 | * without specific prior written permission. | ||
844 | * | ||
845 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | ||
846 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
847 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
848 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | ||
849 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
850 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
851 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
852 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
853 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
854 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
855 | * SUCH DAMAGE. | ||
856 | * | ||
857 | * $Id: wget.c,v 1.75 2004/10/08 08:27:40 andersen Exp $ | ||
858 | */ | ||
859 | |||
860 | |||
861 | |||
862 | /* | ||
863 | Local Variables: | ||
864 | c-file-style: "linux" | ||
865 | c-basic-offset: 4 | ||
866 | tab-width: 4 | ||
867 | End: | ||
868 | */ | ||